Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for realizing distribution of smart cards

A technology of smart cards and instructions, applied in the field of smart cards, can solve problems such as data tampering

Active Publication Date: 2012-10-03
DATANG MICROELECTRONICS TECH CO LTD
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0024] 3) Data may be tampered with during transmission
[0025] Therefore, the traditional method needs to conduct security management appraisal on the issuance process, such as the operator signs a non-disclosure agreement with the card issuer, but it cannot completely guarantee the security of the data technically.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing distribution of smart cards
  • Method and system for realizing distribution of smart cards
  • Method and system for realizing distribution of smart cards

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The technical solutions of the present invention will be described in detail below in conjunction with the accompanying drawings and preferred embodiments. It should be understood that the following examples are only used to illustrate and explain the present invention, but not to limit the technical solution of the present invention.

[0068] Such as figure 1 As shown, it is the flow process of the embodiment of the method for realizing smart card issuance provided by the present invention, including the following steps:

[0069] 110: The smart card installs the application through the main security domain;

[0070] When the installed application is not associated with the primary security domain (ISD) (for example, there are multiple providers of the installed application), it is also necessary to associate the installed application with the ISD.

[0071] For example, through the application of the ISD installation card of the (U)SIM of the private network, the appl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for realizing distribution of smart cards. The method comprises the following steps that: the smart cards are installed with applications by virtue of a main security domain; and a distribution system establishes a secure channel with the smart cards through mutual authentication, and a session key is dynamically generated. According to the invention, a mutual authentication process is carried out between the distribution system and the smart cards, and the session key is generated in a dispersed manner in the process by adopting a random number and is difficult to obtain, thus safety is good. By adopting a method that sensitive data is encrypted, security, completeness and safety of the sensitive data are guaranteed. By combining diversified data encryption and security technologies, a password is difficult to break, thus safety when the smart card applies individual data in a smart card distribution process can be guaranteed.

Description

technical field [0001] The invention relates to smart card technology, in particular to a method and system for realizing smart card issuance. Background technique [0002] With the development of telecommunication technology, mobile communication network is not only widely used in public network, but also plays an important role in some special fields, such as military department, commercial organization and urban emergency. In these application scenarios, military or commercial confidential data is involved, and the security requirements are higher than those of public networks. For the (U)SIM card, in terms of security assurance, it not only needs to play the role of user identity authentication in the public network, but also needs to be able to ensure the confidentiality, integrity and source legality of data in terms of sensitive data communication. [0003] According to the IS010202-1 specification, the smart card life cycle is divided into 5 stages: [0004] The fi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W12/06
Inventor 许晶张靖
Owner DATANG MICROELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products